Patents by Inventor Hristo Iliev

Hristo Iliev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9602521
    Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
    Type: Grant
    Filed: June 17, 2016
    Date of Patent: March 21, 2017
    Assignee: SAP SE
    Inventors: Hristo Iliev, Stoyan Boshev
  • Patent number: 9569328
    Abstract: Applications and their application components run on a cloud platform and an underlying cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely change log levels of logger objects defined in application components. The application logs are generated and stored for the application components on the cloud runtime infrastructure of the cloud platform. Log levels affect the content stored in the application logs. The exposed interface is instantiated to process remote requests for managing application logs and log levels for a specified application component. The application component is deployed on the cloud platform. The requested change in the log levels is performed based on the implementation of the interface. The change in the log levels is performed in the configuration data on the cloud runtime infrastructure provided by the cloud platform.
    Type: Grant
    Filed: November 29, 2012
    Date of Patent: February 14, 2017
    Assignee: SAP SE
    Inventors: Vladimir Pavlov, Hristo Kostov, Hristo Iliev, Petar Zhechev, Verzhiniya Noeva
  • Publication number: 20160294850
    Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
    Type: Application
    Filed: June 17, 2016
    Publication date: October 6, 2016
    Inventors: Hristo Iliev, Stoyan Boshev
  • Patent number: 9432398
    Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
    Type: Grant
    Filed: June 11, 2014
    Date of Patent: August 30, 2016
    Assignee: SAP SE
    Inventors: Hristo Iliev, Stoyan Boshev
  • Publication number: 20150365431
    Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
    Type: Application
    Filed: June 11, 2014
    Publication date: December 17, 2015
    Inventors: Hristo Iliev, Stoyan Boshev
  • Publication number: 20150365275
    Abstract: Various embodiments of systems and methods for cloud environment configuration for cloud application are described herein. In an aspect, the method includes receiving a request for starting a cloud application. In response to the received request, binaries of the cloud application are invoked and the cloud environment configuration for the cloud application is identified. It is determined whether the binaries of the cloud application are to be uploaded independently of its cloud environment configuration. When the binaries are to be uploaded independently of its cloud environment configuration, the binaries and the cloud environment configuration are uploaded separately in different transactions onto cloud. In case the binaries are not to be uploaded independently of its cloud environment configuration, an archive including the binaries and the cloud environment configuration is generated and uploaded onto the cloud.
    Type: Application
    Filed: June 12, 2014
    Publication date: December 17, 2015
    Inventors: HRISTO ILIEV, INA IVANOVA, MARIA JUROVA
  • Patent number: 9122841
    Abstract: Applications and their application components are deployed on a cloud platform. The application components generate application logs on the underlying cloud runtime infrastructure of the cloud platform. In one aspect, the application logs may be stored on a network storage on the cloud platform. In another aspect, the application logs may be stored on the cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely provide the stored application logs. The exposed interface is instantiated to process remote requests for application logs for a specified application component. The remote requests are sent from a client. The requested application logs are retrieved based on the implementation of the interface. The application logs are provided to the client.
    Type: Grant
    Filed: October 16, 2012
    Date of Patent: September 1, 2015
    Assignee: SAP SE
    Inventors: Vladimir Pavlov, Hristo Iliev, Verzhiniya Noeva, Hristo Kostov, Petar Zhechev
  • Publication number: 20150188969
    Abstract: A client system requests to upload an input data stream to a server system. The input data stream is split to a sequence of chunks. The chunks are transferred in parallel by a number of connections from the client system to the server system. At the server system, the transferred chunks are merged into an output stream according to the sequence. The output stream represents the rebuilt input stream.
    Type: Application
    Filed: December 27, 2013
    Publication date: July 2, 2015
    Inventors: STOYAN BOSHEV, HRISTO ILIEV, SHENOL YOUSOUF, GEORGI GERGINOV
  • Publication number: 20140109188
    Abstract: Applications and their application components are deployed on a cloud platform. The application components generate application logs on the underlying cloud runtime infrastructure of the cloud platform. In one aspect, the application logs may be stored on a network storage on the cloud platform. In another aspect, the application logs may be stored on the cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely provide the stored application logs. The exposed interface is instantiated to process remote requests for application logs for a specified application component. The remote requests are sent from a client. The requested application logs are retrieved based on the implementation of the interface. The application logs are provided to the client.
    Type: Application
    Filed: October 16, 2012
    Publication date: April 17, 2014
    Inventors: VLADIMIR PAVLOV, Hristo Iliev, Verzhiniya Noeva, Hristo Kostov, Petar Zhechev
  • Publication number: 20070156789
    Abstract: A system and method for file system synchronization is described. A method described includes saving content of a cluster file system (CFS) archive to a CFS database, detecting a change made in the CFS database with respect to the CFS archive, comparing an index of the CFS database with an index of the file system, and updating the file system to reflect the change in the CFS database.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Krasimir Semerdzhiev, Hristo Iliev, Nikolai Dimitrov
  • Publication number: 20070156431
    Abstract: A system and method of starting or stopping components using filters. The filter including an action to be performed on a component, a component type, a vendor name, and a component name.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Krasimir Semerdzhiev, Dimitar Kostadinov, Hristo Iliev, Mladen Markov
  • Publication number: 20050268136
    Abstract: Embodiments include a timeout event management system that registers timeout events and checks for and corrects inaccuracies in timing caused by hibernation or system time changes. The timeout event management system may trigger an event after an intended delay time or at an intended expiration time. A handler program may be called in response to the triggered timeout. In an additional embodiment, the timeout system may track timeout events in a priority queue data structure.
    Type: Application
    Filed: May 28, 2004
    Publication date: December 1, 2005
    Inventors: Dimitar Kostadinov, Petio Petev, Hristo Iliev, Krasimir Semerdzhiev, Georgi Stanev, Jasen Minov